<img height="1" width="1" style="display:none" alt="" src="https://www.facebook.com/tr?id=367542720414923&amp;ev=PageView&amp;noscript=1">

    Not Found

  • 9:50

    Welcome & Introduction to Broadcast

  • 10:00

    Presentation: Creating and Refining Strategies for Resilience – An Integrated Approach for Protection and Response

    Arrow
    • Stronger individual agency cyber security and technology for an uplift to resilience as a whole
    • Collaboration and sharing best practices for a united front against bad actors
    • Mitigating risk by educating your workforce, addressing the skills shortage and revising and implementing new policies

    Speaker: Dr Nalin Arachchilage, Lecturer in Cyber Security and Honorary Associate Professor, The University of Auckland, NZ and University of Warwick, UK (New Zealand)

  • 10:25

    Partner Presentation: Getting Identity Access Management (IAM) right in the public sector

    Arrow

    Identity and access management provides control over user validation and resource access. Commonly known as IAM, this technology ensures that the right people access the right digital resources at the right time and for the right reasons. But how do you ensure that IAM is used right in the public sector? Join this session to hear how.

    • Understanding the benefits, risks, and implications of using IAM
    • Implementing IAM effectively in the public sector and lessons learnt from other applications
    • Exploring the cybersecurity implications of IAM and how to mitigate vulnerabilities 
  • 10:50

    Case Study: Protecting our community from cyber threats and controlling email fraud across NSW Government email domains.

    Arrow

    Digital scams are on the rise, with business email compromise scams costing Australian businesses over $81.45 million in the 2020-2021 financial year, an increase of nearly 15 per cent from the previous financial year. To ensure NSW is prepared to tackle the threat of compromised business emails, the NSW Government has introduced DMARC, a domain-based Message Authentication, Reporting and Conformance tool.

    Speaker: Mark Brittain, Senior Project Manager DMARC, Infrastructure Security, Cyber Security NSW (Australia)

  • 11:15

    Presentation: Educating the workforce on social engineering schemes and how to response

    Arrow

    When users fall victim to social engineering attacks, provide education in place of punishment.  
    Staff education on how to identify social engineering attacks and the appropriate response can provide your staff with valuable experience and knowledge.  
    Join this session to hear how these two speakers have incorporated education into the workforce and more.

    • What are social engineering schemes and how does the lifecycle look like in the public sector
    • Exploring different technologies to detect and neutralise social engineering attempts
    • Identifying ways to prevent social engineering – technologies and education

    Speaker:  Chetan Prasad, Head of Security and Risk, Chief Information Security Officer (CISO), Office of the Controller and Auditor-General of New Zealand (New Zealand) 

  • 11:40

    Presentation: Strategies to mitigate cyber security incidents

    Arrow

    It’s important to review your processes to mitigate vulnerable and weak points in your systems to reduce the risks of cyberattacks. This session will discuss:

    • Minimising the impacts of cyber-attacks on business operations and citizens
    • Laying out comprehensive strategies to prepare employees for an attack
    • Communicating the steps to prevent and respond to an attack to employees and citizens

    Speaker: James DeLuca, Cyber Security Engineering Manager, Security Command, Digital Technology & Innovation, NSW Police Force (Australia)

  • 12:05

    Partner Presentation: Automating Security Operations Centre (SOC) for the public sector

    Arrow

    There are many trends driving investments in security automation and orchestration two of the leading factors are not enough skilled security professionals and the volume, velocity, and complexity of attacks. These two industry experts will discuss:

    • Using AI/ML to monitor and responds to cyberattacks alert
    • Addressing the challenges of automation
    • Understanding operational impact in undertaking the SOC automation journey 
  • 12:30

    Presentation: Refining processes to reduce inside threats risks and human errors

    Arrow

    Alexander Pope famously said, “To err is human”, and not much has changed. We all make mistakes, and some people are more prone to making mistakes than others. The question is: What do you do about it? Join the session to hear two industry experts discuss how they refine the process to reduce inside threats and human errors.

    • Testing current processes to detect potential attack surfaces and mitigating the vulnerabilities
    • Revising processes to ensure vulnerabilities are mitigated and new attack-prevention method is in place
    • Assessing the benefits of threat intelligence sharing across different organisations

    Speaker: Angi Alfred, Principal Project Director, ICT, Health Infrastructure (Australia)

  • 12:55

    Presentation: Securing the digital future - Laying out a framework to secure technology adoption

    Arrow

    Join this industry expert as they discuss what they see as the framework in the pursuit of a digital approach to the public sector opening themselves up to greater cybersecurity risks.

    • Staying abreast of what future attacks on critical infrastructure could be and planning for a response
    • Monitoring the evolving citizen customers’ needs and demands to provide secure services
    • Identifying new cybersecurity talents to build resilience in cyber defence

    Speaker: Mike Jagusch, Manager Mission Enablement, National Cyber Security Centre (New Zealand)

  • 14:15 AEST

    CISO Public Sector ANZ End